Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
VANET Security through Group Broadcast Encryption
(Articles)
Eric Eduardo Bunese
,
Eduardo Todt
,
Luiz Carlos Pessoa Albini
Journal of Computer and Communications
Vol.8 No.8
,August 11, 2020
DOI:
10.4236/jcc.2020.88003
502
Downloads
1,774
Views
Citations
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
(Articles)
Seth Alornyo
,
Mustapha Adamu Mohammed
,
Bright Anibrika Selorm Kodzo
,
Pious Akwasi Sarpong
,
Michael Asante
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812018
442
Downloads
1,243
Views
Citations
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121004
5,034
Downloads
14,912
Views
Citations
A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos
(Articles)
Noura Alexendre
,
Ntsama Eloundou Pascal
,
Simo Thierry
,
Welba Colince
Journal of Computer and Communications
Vol.9 No.2
,February 3, 2021
DOI:
10.4236/jcc.2021.92001
508
Downloads
1,502
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
273
Downloads
1,667
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
,September 30, 2022
DOI:
10.4236/jis.2022.134017
193
Downloads
794
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
212
Downloads
1,399
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
,February 29, 2024
DOI:
10.4236/jcc.2024.122012
138
Downloads
476
Views
Citations
A nonmonotone adaptive trust-region algorithm for symmetric nonlinear equations
(Articles)
Gong-Lin Yuan
,
Cui-Ling Chen
,
Zeng-Xin Wei
Natural Science
Vol.2 No.4
,May 7, 2010
DOI:
10.4236/ns.2010.24045
5,717
Downloads
10,477
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,882
Downloads
9,555
Views
Citations
Permutation and Complementary Algorithm to Generate Random Sequences for Binary Logic
(Articles)
Jie Wan
,
Jeffrey Z. J. Zheng
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45039
4,595
Downloads
8,495
Views
Citations
Computing the Moore-Penrose Inverse of a Matrix Through Symmetric Rank-One Updates
(Articles)
Xuzhou Chen
,
Jun Ji
American Journal of Computational Mathematics
Vol.1 No.3
,September 19, 2011
DOI:
10.4236/ajcm.2011.13016
7,911
Downloads
16,854
Views
Citations
Counting Runs of Ones and Ones in Runs of Ones in Binary Strings
(Articles)
Frosso S. Makri
,
Zaharias M. Psillakis
,
Nikolaos Kollas
Open Journal of Applied Sciences
Vol.2 No.4B
,January 11, 2013
DOI:
10.4236/ojapps.2012.24B011
4,325
Downloads
6,488
Views
Citations
Felicitous Labellings of Some Network Models
(Articles)
Jiajuan Zhang
,
Bing Yao
,
Zhiqian Wang
,
Hongyu Wang
,
Chao Yang
,
Sihua Yang
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 10, 2013
DOI:
10.4236/jsea.2013.63B007
3,674
Downloads
5,534
Views
Citations
Ideal Midline Detection Using Automated Processing of Brain CT Image
(Articles)
Xuguang Qi
,
Ashwin Belle
,
Sharad Shandilya
,
Wenan Chen
,
Charles Cockrell
,
Yang Tang
,
Kevin R. Ward
,
Rosalyn H. Hargraves
,
Kayvan Najarian
Open Journal of Medical Imaging
Vol.3 No.2
,June 3, 2013
DOI:
10.4236/ojmi.2013.32007
6,177
Downloads
10,275
Views
Citations
Bulk Properties of Symmetric Nuclear and Pure Neutron Matter
(Articles)
Khaled Hassaneen
,
Hesham Mansour
Journal of Modern Physics
Vol.4 No.5B
,July 10, 2013
DOI:
10.4236/jmp.2013.45B008
5,223
Downloads
7,116
Views
Citations
Some Results on Generalized Degree Distance
(Articles)
Asma Hamzeh
,
Ali Iranmanesh
,
Samaneh Hossein-Zadeh
Open Journal of Discrete Mathematics
Vol.3 No.3
,July 12, 2013
DOI:
10.4236/ojdm.2013.33026
4,867
Downloads
7,979
Views
Citations
Balanced Min Cost Flow on Skew Symmetric Networks with Convex Costs
(Articles)
Henning Soller
Open Journal of Discrete Mathematics
Vol.3 No.3
,July 12, 2013
DOI:
10.4236/ojdm.2013.33028
3,800
Downloads
5,882
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,882
Downloads
7,009
Views
Citations
On Extensions of Right Symmetric Rings without Identity
(Articles)
Basmah H. Shafee
,
S. Khalid Nauman
Advances in Pure Mathematics
Vol.4 No.12
,December 29, 2014
DOI:
10.4236/apm.2014.412075
3,044
Downloads
3,890
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top